Which view is NOT a valid CPVIEW view?

Which view is NOT a valid CPVIEW view?A . IDAB . RADC . PDPD . VPNView AnswerAnswer: C

January 6, 2020 No Comments READ MORE +

Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.

Fill in the blank: The tool ________ generates a R80 Security Gateway configuration report.A . infoCPB . infoviewC . cpinfoD . fw cpinfoView AnswerAnswer: C

January 6, 2020 No Comments READ MORE +

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?

The CPD daemon is a Firewall Kernel Process that does NOT do which of the following?A . Secure Internal Communication (SIC)B . Restart Daemons if they failC . Transfers messages between Firewall processesD . Pulls application monitoring statusView AnswerAnswer: D Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk97638

January 6, 2020 No Comments READ MORE +

Which command is used to set the CCP protocol to Multicast?

Which command is used to set the CCP protocol to Multicast?A . cphaprob set_ccp multicastB . cphaconf set_ccp multicastC . cphaconf set_ccp no_broadcastD . cphaprob set_ccp no_broadcastView AnswerAnswer: B Explanation: Reference: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk20576

January 4, 2020 No Comments READ MORE +

CPM process stores objects, policies, users, administrators, licenses and management data in a database.

CPM process stores objects, policies, users, administrators, licenses and management data in a database. The database is:A . MySQLB . Postgres SQLC . MarisDBD . SOLRView AnswerAnswer: B Explanation: Reference: https://sc1.checkpoint.com/documents/R80/CP_R80_MultiDomainSecurity/html_frameset.htm?topic=documents/R80/CP_R80_MultiDomainSecurity/15420

January 4, 2020 No Comments READ MORE +

In R80 spoofing is defined as a method of:

In R80 spoofing is defined as a method of:A . Disguising an illegal IP address behind an authorized IP address through Port Address Translation.B . Hiding your firewall from unauthorized users.C . Detecting people using false or wrong authentication loginsD . Making packets appear as if they come from an...

January 4, 2020 No Comments READ MORE +

What happen when IPS profile is set in Detect Only Mode for troubleshooting?

What happen when IPS profile is set in Detect Only Mode for troubleshooting?A . It will generate Geo-Protection trafficB . Automatically uploads debugging logs to Check Point Support CenterC . It will not block malicious trafficD . Bypass licenses requirement for Geo-Protection controlView AnswerAnswer: C Explanation: It is recommended to...

January 4, 2020 No Comments READ MORE +

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?

The fwd process on the Security Gateway sends logs to the fwd process on the Management Server via which 2 processes?A . fwd via cpmB . fwm via fwdC . cpm via cpdD . fwd via cpdView AnswerAnswer: A

January 3, 2020 No Comments READ MORE +

If you needed the Multicast MAC address of a cluster, what command would you run?

If you needed the Multicast MAC address of a cluster, what command would you run?A . cphaprob Ca ifB . cphaconf ccp multicastC . cphaconf debug dataD . cphaprob igmpView AnswerAnswer: D

January 2, 2020 No Comments READ MORE +

Which command will allow you to see the interface status?

Which command will allow you to see the interface status?A . cphaprob interfaceB . cphaprob CI interfaceC . cphaprob Ca ifD . cphaprob statView AnswerAnswer: C Explanation: Reference: https://sc1.checkpoint.com/documents/R76/CP_R76_ClusterXL_AdminGuide/7298.htm

January 2, 2020 No Comments READ MORE +